Search Results - "Sathiyamoorthy, E."
-
1
A novel recommender system based on FFT with machine learning for predicting and identifying heart diseases
Published in Neural computing & applications (01-01-2019)“…Recently, using of the intelligent technologies in the field of clinical decision making is increased rapidly to improve the lifestyles of patients and to help…”
Get full text
Journal Article -
2
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment
Published in The Journal of supercomputing (01-05-2024)“…Securing confidential data against unauthorized users leads to access control policies with the rapid progression of Internet of Things (IoT) devices. Because…”
Get full text
Journal Article -
3
A Comparative study about Workload prediction from one time forecast with cyclic forecasts using ARIMA model for cloud environment
Published in EAI endorsed transactions on energy web (01-09-2020)“…Auto-scaling systems help provisioning resources on demand which helps tap into the elastic nature of the cloud. Theapplications hosted on the cloud tend to…”
Get full text
Journal Article -
4
Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective
Published in Signal, image and video processing (01-07-2024)“…As the Industrial Internet of Things (IIoT) continues to advance, ensuring robust data privacy in data aggregation processes becomes paramount. This paper…”
Get full text
Journal Article -
5
A new trust-based mechanism for detecting intrusions in MANET
Published in Information security journal. (04-07-2017)“…Providing security to Mobile Ad-hoc Networks (MANET) is a challenging and demanding task. It is important to secure the network against intrusions in MANET for…”
Get full text
Journal Article -
6
OMAMIDS: Ontology Based Multi-Agent Model Intrusion Detection System for Detecting Web Service Attacks
Published in Journal of applied security research (01-10-2016)“…Web service plays a significant role in the Internet applications. According to the current researchers, the web services are highly prone to the…”
Get full text
Journal Article -
7
A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID
Published in Cybernetics and information technologies : CIT (01-09-2014)“…Most of the web applications are establishing the web session with the client. It is very important to protect the wireless networks against session hijacking…”
Get full text
Journal Article -
8
Privacy Preservation of a Group and Secure Data Storage in Cloud Environment
Published in Cybernetics and information technologies : CIT (01-01-2015)“…Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that…”
Get full text
Journal Article -
9
Comparative study for feature selection algorithms in intrusion detection system
Published in Automatic control and computer sciences (2016)“…The Intrusion Detection System (IDS) deals with the huge amount of network data that includes redundant and irrelevant features causing slow training and…”
Get full text
Journal Article -
10
A novel and efficient key sharing technique for web applications
Published in 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (01-07-2013)“…Security is a measure of protecting data during its transmission over a network. In the secured transmission scheme, the message will be encrypted using…”
Get full text
Conference Proceeding -
11
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
Published 05-04-2010“…International Journal of Network Security & Its Applications 1.3 (2009) 15-31 This paper is aimed at the stipulations which arise in the traditional online…”
Get full text
Journal Article -
12
Spatially adaptive illumination modeling for background subtraction
Published in 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops) (01-11-2011)“…Background subtraction is important for many vision applications. Existing techniques can adapt to gradual changes in illumination but fail to cope with sudden…”
Get full text
Conference Proceeding